Vulnerability Name:

CVE-2006-3630 (CCN-27827)

Assigned:2006-07-17
Published:2006-07-17
Updated:2018-10-18
Summary:Multiple off-by-one errors in Wireshark (aka Ethereal) 0.9.7 to 0.99.0 have unknown impact and remote attack vectors via the (1) NCP NMAS and (2) NDPS dissectors.
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
5.5 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
5.5 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-189
Vulnerability Consequences:Gain Access
References:Source: SGI
Type: UNKNOWN
20060801-01-P

Source: MITRE
Type: CNA
CVE-2006-3630

Source: CCN
Type: RHSA-2006-0602
wireshark security update (was ethereal)

Source: REDHAT
Type: Vendor Advisory
RHSA-2006:0602

Source: CCN
Type: SA21078
Wireshark Multiple Protocol Dissector Vulnerabilities

Source: SECUNIA
Type: Vendor Advisory
21078

Source: SECUNIA
Type: Vendor Advisory
21107

Source: SECUNIA
Type: Vendor Advisory
21121

Source: SECUNIA
Type: Vendor Advisory
21204

Source: SECUNIA
Type: Vendor Advisory
21249

Source: SECUNIA
Type: Vendor Advisory
21467

Source: SECUNIA
Type: Vendor Advisory
21488

Source: SECUNIA
Type: Vendor Advisory
21598

Source: CCN
Type: SA22089
Avaya Products wireshark Vulnerabilities

Source: SECUNIA
Type: Vendor Advisory
22089

Source: GENTOO
Type: UNKNOWN
GLSA-200607-09

Source: CCN
Type: SECTRACK ID: 1016532
Wireshark (Ethereal) Format String Flaws, Off-by-one Errors, and Buffer Overflow May Let Remote Users Execute Arbitrary Code

Source: SECTRACK
Type: UNKNOWN
1016532

Source: CONFIRM
Type: UNKNOWN
http://support.avaya.com/elmodocs2/security/ASA-2006-197.htm

Source: CCN
Type: ASA-2006-197
wireshark security update (was ethereal) (RHSA-2006-0602)

Source: DEBIAN
Type: UNKNOWN
DSA-1127

Source: DEBIAN
Type: DSA-1127
ethereal -- several vulnerabilities

Source: CCN
Type: GLSA-200607-09
Wireshark: Multiple vulnerabilities

Source: MANDRIVA
Type: UNKNOWN
MDKSA-2006:128

Source: SUSE
Type: UNKNOWN
SUSE-SR:2006:020

Source: OSVDB
Type: UNKNOWN
27366

Source: OSVDB
Type: UNKNOWN
27367

Source: OSVDB
Type: UNKNOWN
27368

Source: CCN
Type: OSVDB ID: 27366
Wireshark NCP Dissector Unspecified Off-by-one

Source: CCN
Type: OSVDB ID: 27367
Wireshark NMAS Dissector Unspecified Off-by-one

Source: CCN
Type: OSVDB ID: 27368
Wireshark NDPS Dissector Unspecified Off-by-one

Source: BUGTRAQ
Type: UNKNOWN
20060719 rPSA-2006-0132-1 tshark wireshark

Source: BID
Type: UNKNOWN
19051

Source: CCN
Type: BID-19051
Wireshark Protocol Dissectors Multiple Vulnerabilities

Source: VUPEN
Type: Vendor Advisory
ADV-2006-2850

Source: CCN
Type: Wireshark Security Advisory wnpa-sec-2006-01
Multiple problems in Ethereal® versions 0.8.14 to 0.10.10

Source: CONFIRM
Type: Patch
http://www.wireshark.org/security/wnpa-sec-2006-01.html

Source: XF
Type: UNKNOWN
wireshark-nmas-ndps-offbyone(27827)

Source: XF
Type: UNKNOWN
wireshark-nmas-ndps-offbyone(27827)

Source: CONFIRM
Type: UNKNOWN
https://issues.rpath.com/browse/RPL-512

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:11350

Source: SUSE
Type: SUSE-SR:2006:020
SUSE Security Summary Report

Vulnerable Configuration:Configuration 1:
  • cpe:/a:wireshark:wireshark:0.9.7:*:*:*:*:*:*:*
  • OR cpe:/a:wireshark:wireshark:0.9.8:*:*:*:*:*:*:*
  • OR cpe:/a:wireshark:wireshark:0.99.0:*:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*

  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*

  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*

  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20063630
    V
    CVE-2006-3630
    2015-11-16
    oval:org.mitre.oval:def:11350
    V
    Multiple off-by-one errors in Wireshark (aka Ethereal) 0.9.7 to 0.99.0 have unknown impact and remote attack vectors via the (1) NCP NMAS and (2) NDPS dissectors.
    2013-04-29
    oval:com.redhat.rhsa:def:20060602
    P
    RHSA-2006:0602: wireshark security update (was ethereal) (Moderate)
    2006-08-16
    oval:org.debian:def:1127
    V
    several vulnerabilities
    2006-07-28
    BACK
    wireshark wireshark 0.9.7
    wireshark wireshark 0.9.8
    wireshark wireshark 0.99.0